An Efficient Data Aggregation Scheme for Protecting the Integrity of Sensitive Data in Wireless Sensor Networks

Since wireless sensor networks (WSNs) are resources-constrained, it is very essential to gather data efficiently. For this, data aggregation schemes are studied to minimize transmission cost in terms of the number of data packets. On the other hand, many applications want to preserve data privacy and integrity from the interception (or eavesdropping) of the data by an adversary. However, the existing schemes suffer from high communication cost. To resolve the problems, in this paper, we propose an efficient data aggregation scheme for protecting the integrity of sensitive data in WSNs. Our scheme makes use of the additive property of complex numbers to achieve sensitive data aggregation with protecting data integrity. With simulation results, we show that our scheme is much more efficient in terms of both communication overheads and integrity checking than the existing schemes for protecting integrity and privacy preserving data aggregation in WSNs.

[1]  Xue Liu,et al.  A Cluster-Based Protocol to Enforce Integrity and Preserve Privacy in Data Aggregation , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems Workshops.

[2]  Rabindra Bista,et al.  Energy Efficient Data Aggregation for Wireless Sesor Networks , 2010 .

[3]  David E. Culler,et al.  TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.

[4]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[5]  Arthur L. Liestman,et al.  Energy-Efficient Data Aggregation Hierarchy for Wireless Sensor Networks , 2005, Second International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE'05).

[6]  Xue Liu,et al.  PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[7]  Gerhard Goos,et al.  Fast Software Encryption , 2001, Lecture Notes in Computer Science.

[8]  Kotagiri Ramamohanarao,et al.  Inverted files versus signature files for text indexing , 1998, TODS.

[9]  Winston K. G. Seah,et al.  Sustainable Wireless Sensor Networks , 2010 .

[10]  K. Nahrstedt,et al.  iPDA: An integrity-protecting private data aggregation scheme for wireless sensor networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[11]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[12]  C. Castelluccia,et al.  Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[13]  Robert Szewczyk,et al.  System architecture directions for networked sensors , 2000, ASPLOS IX.

[14]  Deborah Estrin,et al.  Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.

[15]  Rabindra Bista,et al.  A New Approach for Energy-Balanced Data Aggregation in Wireless Sensor Networks , 2009, 2009 Ninth IEEE International Conference on Computer and Information Technology.

[16]  Martina Zitterbart,et al.  An efficient key establishment scheme for secure aggregating sensor networks , 2006, ASIACCS '06.